Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 5 of 5
  • Item
    MAC layer security issues in wireless mesh networks
    (American Institute of Physics Inc. subs@aip.org, 2016) Karri, K.G.; Santhi Thilagam, P.S.
    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs. © 2016 AIP Publishing LLC.
  • Item
    SYBIL ATTACK SIMULATION AND MITIGATION IN UNETSTACK
    (Institute of Electrical and Electronics Engineers Inc., 2021) Chandavarkar, B.R.; Shantanu, T.K.
    Underwater networks have the potential to enable unexplored applications and to enhance our ability to observe and predict the ocean. Underwater acoustic sensor networks (UASNs) are often deployed in unprecedented and hostile waters and face many security threats. Applications based on UASNs such as coastal defense, pollution monitoring, assisted navigation to name a few, require secure communication. A new set of communication protocols and cooperative coordination algorithms have been proposed to enable collaborative monitoring tasks. However, such protocols overlook security as a key performance indicator. Spoofing, altering, or replaying routing information can affect the entire network, making UASN vulnerable to routing attacks such as selective forwarding, sinkhole attack, Sybil attack, acknowledgement spoofing and HELLO flood attack. The lack of security against such threats is startling if maintained that security is indeed an important requirement in many emerging civilian and military applications. In this work, we look at one of the most prevalent attacks among UASNs which is Sybill attack and discuss mitigation approaches for it. Then, feasibly implemented the attack in UnetStack3 to simulate real-life scenario. © 2021 IEEE.
  • Item
    Performance Evaluation of Wireless Health and Remote Monitoring Network Throughput Under Varying Conditions Using NetSim
    (Institute of Electrical and Electronics Engineers Inc., 2024) Pabitha, B.; Vani, V.; Sanshi, S.
    The Wireless Body Area Network (WBAN), organized in/out of the human body region to form Wireless enabled Health and Remote monitoring Network (WHRN), is trending on the medical platform for efficient diagnosis by the physician without the patient's physical visit. This network is framed with different biological sensors in the regional area of the human body to sense unlike biological signals promptly. Wearable WHRN, like smart watches and mobile phones, can notify people about stress, heart rate, and other physiological nods. The technology developed enhances the treatment for the patient, but the security of the information transmitted over different mediums is vulnerable. WHRN is simulated using the NetSim standard tool. Network performance metrics and their plots are analyzed using various encryption standards to provide data transmission and diagnosis security. Security is the primary concern for physiological data sensed and transmitted over different mediums. © 2024 IEEE.
  • Item
    Hybrid Voting System Using Blockchain
    (Institute of Electrical and Electronics Engineers Inc., 2024) Nikhare, R.V.
    Voting is a vital pillar of democracy, upholding the principles of representation and public expression. Over time, the quest for secure and efficient systems has driven the transition from paper ballots to Electronic Voting Machines (EVMs). Nonetheless, persistent concerns surrounding EVM security have spurred the exploration of blockchain-based voting systems. The inherent attributes of transparency and immutability offered by blockchain technology hold promise in augmenting the security and integrity of the voting process. However, blockchain-based voting systems encounter their own distinct challenges. This paper presents a pioneering hybrid voting system model that harmonizes the merits of existing systems with the potential of blockchain technology. In this hybrid model, the authentication of voters is collaboratively facilitated by government employees and blockchain technology. Subsequently, voters can securely register their votes within the blockchain. Striving to strike a delicate equilibrium between convenience and security, this model aims to engender a resilient and all-encompassing voting system that inspires trust. A comprehensive assessment of the strengths and limitations inherent in traditional voting systems is undertaken, while simultaneously exploring the vast potential of blockchain technology. By effectively addressing the concerns pertaining to security and integrity, the proposed hybrid model aspires to forge a path toward a voting system that is both resilient and unequivocally trusted. ©2024 IEEE.
  • Item
    D-DNS: A Decentralized Domain Name System on the Blockchain: Implementation and Assessment
    (Institute of Electrical and Electronics Engineers Inc., 2024) Divakarla, U.; Chandrasekaran, K.
    Cache poisoning and DDoS attacks are just two of the many ways that the Domain Name System (DNS), an essential part of the Internet infrastructure, can be attacked. Countermeasures have been suggested, although they are not without restrictions. This article introduces D-DNS, a domain name system built on blockchain technology that can offer effective and safe DNS services. D-DNS solves two issues with current blockchain-based DNS systems: the inefficient query handling and the computationally demanding Proof-of-Work (PoW) protocol. D-DNS accomplishes this by putting in place a domain index and a Proof-of-Stake (PoS) consensus mechanism. To evaluate the security of D-DNS versus legacy DNS in terms of attack success rate, attack cost, and attack surface, a new quantitative comparison is presented.. According to experimental results, the attack surface of D-DNS is substantially less than that of legacy DNS, the attack cost is a million times higher, and the chance of a successful attack on D-DNS is 1% of a successful attack on legacy DNS. When D-DNS query performance is compared to the most advanced commercial DNS implementations, it is demonstrated to achieve equivalent or even reduced query latency. © 2024 IEEE.